Two-Factor Data Security Protection Mechanism For Cloud Storage System
Two-Factor Data Security Protection Mechanism For Cloud Storage System
Abstract -- Here, we propose a two-factor data security it is stored the higher risk it contains for unauthorized
protection mechanism with factor revocability for cloud physical access to the data. By sharing storage and
storage system. Our system allows a sender to send an networks with many other users it is also possible for
encrypted message to a receiver through a cloud storage
other unauthorized users to access your data. This may
server. The sender only needs to know the identity of the
be due to mistaken actions, faulty equipment, or
receiver but no other information (such as its public key or
its certificate). The receiver needs to possess two things in
sometimes because of criminal intent. A promising
order to decrypt the cipher text. The first thing is his/her solution to offset the risk is to deploy encryption
secret key stored in the computer. The second thing is a technology. Encryption can pro-tect data as it is being
unique personal security device which connects to the transmitted to and from the cloud service. It can further
computer. It is impossible to decrypt the cipher text without protect data that is stored at the ser-vice provider. Even
either piece. More importantly, once the security device is there is an unauthorized adversary who has gained
stolen or lost, this device is revoked. It cannot be used to access to the cloud, as the data has been encrypted, the
decrypt any cipher text. This can be done by the cloud
adversary cannot get any information about the
server which will immediately execute some algorithms to
plaintext. Asymmetric encryption allows the encrypt
change the existing cipher text to be un-decrypt able by this
device. This process is completely transparent to the sender.
or to use only the public information (e.g., public key
Furthermore, the cloud server cannot decrypt any cipher or identity of the receiver) to generate a cipher text
text at any time. The security and efficiency analysis show while the receiver uses his/her own secret key to
that our system is not only secure but also practical. decrypt. This is the most convenient mode of
encryption for data transition, due to the elimination of
I. INTRODUCTION key management existed in symmetric encryption. In
a normal asymmetric encryption, there is a single
secret key corresponding to a public key or an identity.
CLOUD storage [10] is a model of net-worked storage
The decryption of cipher text only requires this key.
system where data is stored in pools of storage which
The key is usually stored inside either a personal
are generally hosted by third parties. There are many
computer or a trusted server, and may be protected by
benefits to use cloud storage. The most notable is data
a password. The security protection is sufficient if the
accessibility. Data stored in the cloud can be accessed
computer/server is isolated from an opening network.
at any time from any place as long as there is network
Unfortunately, this is not what happens in the real life.
access. Storage maintenance tasks, such as purchasing
While being associated with the world through the
additional storage capacity, can be offloaded to the
Internet, the PC/server may experience the ill effects
responsibil-ity of a service provider. Another
of a potential hazard that programmers may barge in
advantage of cloud storage is data sharing between
into it to trade off the mystery key without letting the
users. If Alice wants to share a piece of data (e.g., a
key proprietor know. In the physical security
video) to Bob, it may be difficult for her to send it by
viewpoint, the PC putting away a client decoding key
email due to the size of data. Instead, Alice uploads the
might be utilized by another client when the first PC
file to a cloud storage system so that Bob can
client (i.e. the key proprietor) is away (e.g., when the
download it at any time.
client goes to latrine for some time without locking the
Despite its advantages, outsourcing data storage also machine). In an endeavor or school, the sharing use of
increases the attack surface area at the same time. For PCs is likewise normal. For instance, in a school, an
example, when data is distributed, the more locations open PC in a copier room will be imparted to all
understudies remaining at a similar floor. In these user needs to have his/her secret key which is stored in
cases, the mystery key can be bargained by a few the computer. Second, the user needs to have a unique
aggressors who can get to the casualty's close to home personal security device which will be used to connect
information put away in the cloud framework. In this to the computer (e.g., USB, Bluetooth and NFC). It is
way, there exists a need to improve the security impossible to decrypt the cipher text without either
assurance. piece.
A similarity is e-keeping money security. Numerous 3) More importantly, our system, for the first time,
e-managing an account applications require a client to provides security device (one of the factors)
utilize both a secret key and a security gadget (two revocability. Once the security device is stolen or
variables) to login framework for cash exchange. The reported as lost, this device is revoked. That is, using
security gadget may show a one-time watchword to this device can no longer decrypt any cipher text
give the client a chance to type it into the framework, (corresponding to the user) in any circumstance. The
or it might be expected to associate with the PC (e.g., cloud will immediately execute some algorithms to
through USB or NFC). The motivation behind change the existing cipher text to begun-decryptableby
utilizing two elements is to improve the security this device. This process is completely transparent to
assurance for the entrance control. the sender.
[5] M. Blaze, G. Bleumer, and M. Strauss, Proc. Int. Conf. Theory Appl. Cryptographic
“Divertible protocols and atomic proxy Techn., 2003, pp. 130–144.
cryptography,” in Proc. Int. Conf. Theory [18] L. Ferretti, M. Colajanni, and M. Marchetti,
Appl. Cryp-tographic Techn., 1998, pp. 127– “Distributed, concurrent, and independent
144. access to encrypted cloud databases,” IEEE
[6] A. Boldyreva, V. Goyal, and V. Kumar, Trans. Parallel Distrib. Syst., vol. 25, no. 2,
“Identity-based encryp-tion with efficient pp. 437–446, Feb. 2014.
revocation,” in Proc. ACM Conf. Comput. [19] C. Gentry, “Certificate-based encryption and
Com-mun. Security, 2008, pp. 417–426. the certificate revocation problem,” in Proc.
[7] D. Boneh, X. Ding, and G. Tsudik, “Fine- Int. Conf. Theory Appl. Cryptographic
grained control of secu-rity capabilities,” Techn., 2003, pp. 272–293.
ACM Trans. Internet Techn., vol. 4, no. 1, pp. [20] M. Green and G. Ateniese, “Identity-based
60– 82, 2004. proxy re-encryption,” in Proc. 5th Int. Conf.
[8] D. Boneh and M. Franklin, “Identity-based Appl. Cryptography Netw. Security, 2007,
encryption from the Weil pairing,” in Proc. pp. 288–306.
21st Annu. Int. Cryptol. Conf., 2001, pp.
213– 229.
[9] R. Canetti and S. Hohenberger, “Chosen-
ciphertext secure proxy re-encryption,” in
Proc. ACM Conf. Comput. Commun.
Security, 2007, pp. 185–194.